FREE TO VIEW


« Back to News

2017-11-29

Apple Must Fix Its Embarrassing Password Bug

A security researcher has uncovered a bug in Apple macOS High Sierra so remarkably simple, it is described as a "howler" and "embarrassing".

2017-11-29

N. Korea Is Ready For Global Cyber Conflict

Not content with ICBMs, N Korea is also capable of causing damage worldwide through cyber-attacks on selected targets in defense, industry & media.

2017-11-29

Startups Are Changing The Future Of Cybersecurity

The 2017 WIRED Security Conference cast a spotlight for investors on some of the brightest prospects in the cybersecurity startup sector.

2017-11-28

GDPR Will Impact Data Management In The USA

You don’t have to have physical operations in Europe to be affected by the GDPR and failure to prepare can result in crippling fines.

2017-11-28

3D Mapping Can Locate Survivors In Burning Buildings

Researchers are working on signal processing methods for imaging & material characterisation which, combined with radar, could be life-saving.

2017-11-28

Russia Is Building Killer Robots

Russia has successfully undermined the UN Experts Group attempts to place limits on the development of lethal autonomous 'Killer Robot' weapons.

2017-11-30

The US National Security Agency Is On The Ropes

Serial leaks of the agency's cyber-weapons have damaged morale, slowed intelligence operations & resulted in attacks on businesses worldwide.

2017-11-27

Who's Responsible For Cloud Security?

While the cloud brings benefits, security remains a particular area of concern for US government agencies and it’s not always clear who’s in charge.

2017-11-25

Cyber Monday 2017 UK Deals

$3.5 Billion Spent In One Day: Forget about Black Friday, if you want to buy tech equipment online, it's all about Cyber Monday 27th November.

2017-11-24

Saudi Arabia Under Attack

Muddy Water: Saudi Arabian security officials admit that the country has been targeted as part of a wide-ranging cyber espionage campaign.

2017-11-24

Uber Wants 24,000 Driverless Volvos

Volvo says it will supply Uber’s Advanced Technologies Group with 24,000 XC90 SUVs equipped with autonomous self-driving technology.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Infosecurity Europe, 3-5 June 2025, ExCel London

Infosecurity Europe, 3-5 June 2025, ExCel London

This year, Infosecurity Europe marks 30 years of bringing the global cybersecurity community together to further our joint mission of Building a Safer Cyber World.

GFI Software

GFI Software

GFI Software works with System Administrators, IT Professionals and IT Executives to ensure that their IT infrastructures are monitored, managed, secured and compliant.

Jones Day

Jones Day

Jones Day is an international law firm based in the United States. Practice areas include Cybersecurity, Privacy & Data Protection.

Netsurion

Netsurion

Netsurion powers secure and agile networks for highly distributed and small-to-medium enterprises and the IT providers that serve them.

ThreatReady Resources

ThreatReady Resources

ThreatReady reduces an organization’s risk by delivering cyber security awareness training based on the latest, state-of-the-art learning science to effectively drive long-term cyber-safe behavior.

Ironhack

Ironhack

Ironhack provide intensive training courses & bootcamps in Web Development, UX/UI Design, Data Analytics & Cybersecurity.

Mitiga

Mitiga

Mitiga uniquily combines the top cybersecurity minds in Incident Readiness and Response with a cloud-based platform for cloud and hybrid environments.

Navisite

Navisite

Navisite is a combination of eight respected IT consulting and managed service providers that were brought together under the Navisite brand.

Cloud Range

Cloud Range

Cloud Range provides cybersecurity teams with access to the world's leading cyber range platform, eliminating the need to invest in costly cyber range infrastructure.

Yogosha

Yogosha

Yogosha is a crowdsourced cybersecurity platform enabling a win-win collaboration with the most talented hackers to detect and fix vulnerabilities on your most critical systems.

Iris Powered by Generali

Iris Powered by Generali

Iris Powered by Generali is an identity theft resolution provider. Our offering combines expert assistance and support with user-friendly identity protection technology.

StrongBox.Academy

StrongBox.Academy

StrongBox.Academy provides cybersecurity training courses that are tailored to the specific needs and challenges of the industry.

NSW IT Support

NSW IT Support

NSW IT Support: Your exclusive hub for comprehensive Business IT services in Sydney. Our skilled team ensures seamless technology solutions nationwide, consistently delivering top-tier IT support.

Teal Technology Consulting

Teal Technology Consulting

TEAL Technology Consulting is your trusted advisor for all your information security needs.

CyberKinetics

CyberKinetics

CyberKinetics specializes in cloud-based services and solutions for federal agencies and commercial clients with compliance mandates.

CYNC Secure

CYNC Secure

CYNC boosts cybersecurity remediation by consolidating fragmented data and optimizing operational processes.

SecuRedact

SecuRedact

SecuRedact is an AI-powered tool to detect and pseudonymize personal data in text and images. Fast, local, secure, and free to try.